A) Spyware B) Viruses C) Malware D) Spam
A) A phase in the Middle Ages B) All of the above C) A term reffering to the Stone Age D) The current era characterized by the use of digital technologies
A) Larged-sized computer hardware B) Massive datasets that require advanced analytics C) Extremely large physical documents D) Extremely large physical documents
A) 2001 B) 2000 C) 2005 D) 2003
A) Blogs B) Wikis C) Video Sharing Sites D) Social Networking
A) Charles Babbage B) Grace Hopper C) John von Neumann D) Ada Lovelace
A) Edison B) Byron C) Babbage D) Mauchly
A) Analytical Engine B) Computer C) Telephone D) Calculator
A) The latest version of internet browsers B) A type of computer programming language C) A network of interconnected smart devices that communicate and share data D) The internet used exclusively for gaming
A) Phishing B) Fishing C) Clicking D) Hacking
A) Unauthorized access to personal data B) Improved user control over device functionalities C) Excessive device durability D) Limited data storage capabilities
A) Internet of Things B) Augmented Reality C) Blockchain Data D) 5G
A) Limited access to medical information B) Increased paperwork and administrative tasks C) Improved patient care and treatment options D) Slower response time in emergencies
A) Limited access to movies and music B) Decreased options for entertainment C) Enabled on-demand and personalized entertainment choices D) Increased cost of entertainment
A) Twitter B) Tiktok C) Facebook D) Instagram
A) Technological Change B) Technological Determinism C) None of the above D) Social Constructivism
A) Increased unemployment rates B) Slowed down economic growth C) Led to economic recession D) Enhanced productivity and efficiency
A) Prison major B) Prison mayor C) Reclusion temporal D) Reclusion temporary
A) Cloud Computing B) Virtual Reality C) Wi-Fi Eavesdropping D) Automation
A) All of these B) Through wired telephone lines C) Through postal mail D) Wirelessly through the internet
A) Stealing someone's personal information to impersonate them for fraudulent purposes B) A harmless online park C) Pretending to be someone else in online forums D) Creating fake social media profiles
A) Virus B) Worms C) Spyware D) Malware
A) Using a combination of uppercase, lowercase, numbers, and symbols B) Using the same password across multiple accounts C) Using the same password across multiple accounts D) Regularly changing passwords every few years
A) Incompatibility with modern networks B) Lack of device connectivity C) Excessive power consumption D) Vulnerabilities in IoT device security
A) To make the message longer B) To show off one's technical skills C) To convey emotion or tone in text-based conversation D) To confuse the recipient
A) Internet of Things B) Virtual Reality C) Augmented Reality D) Artificial Intelligence
A) Reduced personal interaction B) Increase in access to information and services that has accompanied the growth of the internet C) Can help people to communicate trough online games D) Students can access teaching materials from all over the world
A) 2023 B) 2020 C) 2014 D) 2008
A) Through postal mail B) Through wired telephone lines C) Wirelessly through the internet D) Wirelessly through the internet
A) None of the above B) Technological Change C) Social Constructivism D) Technological Determinism
A) Trojan Horses B) Spam C) Spyware D) Ransomware
A) Blaise Pascal B) Charles Babbage C) John Mauchly D) Grace Hopper
A) Trojan Horses B) Viruses C) Wi-Fi Eavesdropping D) Worms
A) Internet devices B) Communication devices C) Internet of Things D) Communication of things
A) Z1 B) 5G C) ED1 D) AI
A) Malware B) Pharming C) Spamming D) Phishing
A) All of the above B) Work from outside of the Country C) Work inside the Company D) Teleworking (Work from Home)
A) They attempt to trick individuals into revealing sensitive information B) They involve physical break-ins C) They are always detected and prevented by antivirus software D) They are always detected and prevented by antivirus software
A) Republic Act No. 10173 Data Privacy Act of 2013 B) Republic Act No. 10175 Cybercrime Prevention Act of 2012 C) Republic Act No. 10173 Data Privacy Act of 2012 D) Republic Act No. 10175 Cybercrime Prevention Act of 2013
A) Vinton Gray B) Timothy John Berners-Lee C) Mark Zuckerberg D) Jack Dorsey
A) Ransomware B) Spyware C) Adware D) Trojan Horse
A) Web 3.0 B) Web 1.0 C) Web 2.0 D) Web 1.1
A) Abacus B) Petroglyphs C) Papyrus Plant D) Phoenician Alphabet
A) Dataset B) Database C) Data transmission D) Data Communication
A) Improved user control over device functionalities B) Unauthorized access to personal data C) Excessive device durability D) Limited data storage capabilities
A) Basic mobile phone B) Standard printer C) Smart thermostat D) Traditional desktop computer
A) No impact on the environment B) Increased pollution and waste C) Decreased use of natural resources D) Positive contribution to environmental conservation
A) Securing online transactions B) Fast downloading of files C) Real-time data transmission of audio or video content D) Conducting online surveys
A) Augmented Reality B) Augmented Virtual C) Blockchain Data D) Virtual Reality
A) Blockchain Data B) Blockchain Communication C) Blockchain Message D) Blockchain Reality
A) 2008 B) 2014 C) 2020 D) 2023
A) Improved access to a variety of learning materials B) Decreased access to educational resources C) Limited interaction with teachers D) Increased travel time to physical classrooms
A) Cloud computing B) Automation C) Virtual Reality D) Wi-Fi Eavesdropping
A) All of the above B) Helps people live and work smarter, as well as gain complete control over their lives C) Enables companies to automate processes and reduce labor costs. It also cuts down on waste and improves service delivery, making it less expensive to manufacture and deliver goods D) One of the most important technologies of everyday life, and it will continue to pick up steam as more businesses realize the potential of connected devices to keep them competitive
A) All of the above B) Because of the COVID-19 pandemic many business faced significant challenges and turned into online businesses C) Because of the new gadget that will be released D) Because of many modern technologies
A) Malware B) Identity theft C) Hacking D) Viruses
A) All of the above B) Decreased need for strategic planning C) Increased reliance on intuition D) Improved data-driven decision-making through analytics
A) Blockchain B) Analog computing C) Mainframe computing D) Cloud computing
A) To raise awareness about potential internet threats and safe online practices B) To promote ethical hacking practices C) To increase vulnerability to cyber attacks D) To teach hacking techniques
A) File server B) Application server C) Policy server D) Mailserver
A) Always, to ensure clarity and professionalism B) Only when writing formal emails C) Only when communicating with close friends D) Never, because it's not important in the Digital world
A) Cyberbullying B) Child Pornography C) Cyber Defamation D) Cybersex
A) FTP B) IPsec C) SSH D) HTTPS
A) Penalty atleast Php 500,000 and or prison mayor B) Prison mayor only C) Penalty atleast Php 200,000 and or prison mayor D) Penalty atleast Php 5,000
A) Internet Security Protocol B) Internet Search Provider C) Internet Service Provider D) Internet Support Program
A) None of the above B) Network and Etiquette C) Networking and Technology D) Internet and Etiquette
A) Penalty at least Php 500, 000 and or prison mayor B) Penalty of 1 year of imprisonment or prison mayor C) Penalty of 6-12 years of imprisonment or prison mayor D) Penalty of 20,000
A) Piracy B) Computer Addiction C) Copyright infringement D) Plagiarism
A) A social media platform B) A set of rules for polite and respectful behavior on the Internet C) A social media platform D) A type of computer virus
A) Prison mayor B) Reclusion temporary C) Prison major D) Reclusion temporal
A) The email is spam and should be deleted B) The sender is shouting or being rude C) The sender is emphasizing the importance of the email D) The email contains confidential information
A) A software that provides free services B) A legitimate form of remote work C) A software that provides free services D) Malicious software that encrypts a victims data and demands a ransom for its release
A) Facebook B) Amazon C) eBay D) YouTube
A) Bait B) Bit C) Byte D) Byt
A) Personal Website B) Media Website C) Educational Website D) Nonprofit Website
A) IP address B) DNS C) Server D) Browser
A) The study of the stock market B) The science of artificial intelligence C) A type of computer game D) The practice of securing computer systems and networks from cyber threats
A) Thou shall respect personal space B) Thou shall avoid eye contact C) Thou shall be prompt D) Thou shall be prompt
A) Tumbler B) Blogger C) Wordpress D) Pinterest |